Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android
|
|
|
- Andrew Walker
- 10 years ago
- Views:
Transcription
1 Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android Huda Ubaya Department of Computer Engineering, Faculty of Computer Science, Universitas Sriwijaya Jl. Raya Palembang - Prabumulih Km. 32 Indralaya, Ogan Ilir, South Sumatra [email protected] ABSTRAKSI Sejak akhir tahun 1990-an, orang-orang telah menikmati gaya hidup yang nyaman. Perangkat mobile yang didukung oleh perkembangan jaringan nirkabel telah menyebar ke seluruh dunia. Orang-orang dapat memperoleh informasi, memesan tiket, mengunduh lagu dan melakukan transaksi komersial yang disebut mobile commerce. Aplikasi mobile commerce menjadi aplikasi yang paling digemari bagi para pengguna perangkat mobile yang menginginkan melakukan transaksi bisnis dan keuangan dengan mudah dan aman, kapan saja dan dimana saja mereka berada. Saat ini penggunaan uang tunai secara fisik sedang mengalami penurunan popularitas di dunia bisnis, karena mulai digantikan oleh pembayaran non-fisik yang sering disebut uang elektronik (electronic money, e-money). Sebuah teknologi penting di balik pembayaran mobile adalah Near Field Communication (NFC). Sebagai indikasi bahwa NFC mempunyai potensi bisnis yang luar biasa, perusahaan terkemuka seperti Nokia, Microsoft, Visa Inc. dan MasterCard Worldwide dan NXP Semiconductors, secara aktif terlibat menggarapnya. Proses pembayaran yang terintegrasi dengan teknologi NFC berbasis sistem operasi mobile yang sedang trend saat ini yaitu Android yang mendukung teknologi NFC yaitu versi Gingerbread. Prototipe aplikasi bayar dirancang untuk 2 sisi pengguna yaitu pada sisi user sebagai konsumen dan pada sisi merchant sebagai pedagang/penjual dengan menggunakan handset yang sudah memiliki teknologi NFC yaitu Google Samsung Nexus S. Prototipe aplikasi bayar juga mengimplementasikan konsep keamanan dalam transaksi e-commerce dengan menggunakan protokol Tag-to-Tag sehingga kebutuhan pengguna untuk keamanan dan kenyamanan selama bertransaksi finansial terpenuhi. Kata Kunci: Android, NFC, pembayaran, mobile, Tag-to-Tag, e-money ABSTRACT Since the late 1990s, people have enjoyed a comfortable lifestyle. Mobile devices supported by the development of wireless networks have spread throughout the world. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Today the use of physical cash is experiencing a decline in popularity in the business world, because it is being replaced by electronic money (e-money). An important technology behind mobile payments is now called Near Field Communication (NFC). As an indication that the NFC has tremendous business potential, leading companies like Nokia, Microsoft, ISSN: (Print) 1
2 Visa Inc., and MasterCard Worldwide and NXP Semiconductors, is actively engaged on them. Payment processing integrated with NFC technology based mobile operating system that is a trend today, Android. The prototype application is designed to pay for the user side as consumer and the merchant side as a trader or seller by using the handset that already have NFC technology is Google Samsung Nexus S. This application prototype also implements the concept of security in e- commerce transactions by using the protocol Tag-to-Tag so that the user needs for security and comfort during the financial transaction are met. Keywords: Android, NFC, payment, mobile, Tag-to-Tag, e-money 1. INTRODUCTION Since the early 2000's, wireless networks have been developed in Europe and Asia. Currently, the penetration rates of mobile devices in the countries reach 80-90%. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Analysts predict there are three main regions for mobile payments is the Far East Asia and China, Western Europe and the United States, which as a whole will account for more than 70 percent of overall mobile payment in financial transactions in 2013 [1]. An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that the NFC has tremendous business potential, leading companies such as Nokia, Microsoft, Visa Inc., And MasterCard Worldwide and NXP Semiconductors, actively engaged in the NFC Forum, a nonprofit group comprised of industry players both technical and non-technicalminded to make a standard NFC-based transactions. In this thesis offers a prototype payment application using mobile phone device in which the technology is already integrated Near Field Communication (NFC). The discussion in this research focused on the security of NFC based communication when making the payment process between user and merchant. This study protocol implements Tag-to-Tag as NFC based communication security protocols. Testing is done by simulating the actual payment process by using 2 mobile devices Samsung Nexus S, each of which acts as a user and merchant. 2. MOBILE COMMERCE Mobile commerce is the buying and selling of goods or services through wireless devices such as mobile phones, personal data assistants (PDAs), smart phones and handheld gaming devices. Mobile commerce is also described as any transaction with monetary value which conducted through mobile telecommunications networks. Mobile commerce using mobile devices to communicate interact and conduct transactions over mobile networks or wireless networks. Mobile commerce is all about the wireless e-commerce using mobile devices to conduct business on the internet. Mobile commerce is also defined as the exchange value or the purchase 2 ISSN: (Print)
3 and sale of financial products, services or information on the internet using mobile devices. Mobile commerce according to Ericsson ( is the trusted transaction services through mobile devices to exchange goods and services between consumers, merchants and financial institutions. So during the transaction or transfer money to an intermediary mobile device, it can be categorized as mobile commerce. [2] Mobile commerce seen globally is very helpful and very beneficial for users but also has its advantages and disadvantages. The advantages of mobile commerce are; 1. customer satisfaction, cost savings and new business opportunities, 2. transactions can be done anywhere and anytime, 3. owner has control over the data while the mobile device can be synchronized, 4. allow for considerable profit, and customer relations became closer. 3. MOBILE PAYMENT Mobile payments [3][8][9][10] are also defined as the process of exchanging financial value between two entities using mobile devices to pay for a product or service. As depict in Figure 1, alternative payment options that consumers able to pay for products or services anywhere and anytime with the convenience of using mobile devices such as mobile phones, or smart phone. The system is designed to operate using wireless technology (wireless) such as Infrared, Bluetooth, Wi-Fi (802.11), WiMAX (802.16) and the latest technology that is Near Field Communication (NFC). NFC Handset User NFC Handset Merchant User Merchant count Payment amount confirmation E-money record receipt checkout preparing Figure 1. The process of paying The main driving factor of mobile payments is the use of mobile phones are increasingly widespread and evenly, and the trend toward electronic money (digital cash). Mobile payments have three functions: 1. Enhance consumer convenience / user by providing the flexibility to use this service anytime and anywhere, or in other words, mobile payments provide an economical solution to save time and money. ISSN: (Print) 3
4 2. Promoting competition opportunities in the payments market. Mobile payments offer new services to market and facilitate the payment of the effectiveness of using the payment system by introducing the concept of electronic money. 3. Offers new opportunities for mobile service providers and financial institutions in the mobile market with a variety of new and innovative business models. 4. NEAR FIELD COMMUNICATION (NFC) Near Field Communication (NFC) [4][5] is a new wireless connectivity technologies to the radius of the short range, which evolved from the combination of contactless identification and interconnection technologies (RFID). NFC operates at a frequency of MHz and has a data transfer rate of up to 424 Kbps. Effective communication and optimal between two NFC-enabled devices occurs when they are at a distance of 0 to 10 cm. Simple movement as twist or swing closer connections between devices can initiate NFC, which will also be compatible with Bluetooth or Wi-Fi (show in Figure 2). Figure 2. NFC Technology NFC technology is a combination between the smartcard and reader that is planted in a single device, such as mobile phones or smart phones. With the NFC device planted on a mobile device, then the transaction activities such as micropayments or payment transactions can be done by juxtaposing it to the NFC reader, which is at the terminal point of sale (POS) at the location of the transaction. With a feature like this then NFC referred to as device that supports the contactless transaction. Figure 3. NFC operation modes 4 ISSN: (Print)
5 As for some applications that can be developed using NFC technology are as follows. 1. Ticketing NFC can provide the ability for users to perform secure payment processing, shopping with electronic money, and can also make purchases, sales and electronic ticketing, such as music tickets, airline tickets, bus tickets and more. 2. Electronics key An example is the use of mobile phone as car keys, house keys or office keys. 3. Identification In addition, NFC can make things possible that your mobile phone will be used as identity documents. 4. Social networking Data stored on the tag objects such as a DVD box or poster can be accessed by mobile phone for example, to upload movie trailers, street maps, show schedules, comments about events and much more. 5. Set-up Service To avoid complex configuration process, NFC can be used to set up other wireless technologies like Bluetooth and wireless LAN. 5. ADVANCED ENCRYPTION SYSTEM (AES) Encryption is a block cipher symmetric key cipher which operates on the length groups of bits are often called blocks with the same transformation. When a block cipher encryption process takes n-bit block of plaintext as input and outputs the same amount with the input n-bit block cipher as well as text. After the delivery process, the receiver section will perform the decryption process which in principle is similar to the encryption process at the sender (transmitter) is decryption algorithm will take the same n-block cipher with a secret key and produce original n-bit block of plain text. [6][7] Rijndael supports key length of 128 bits to 256 bits with 32 bits step. Key length and block size can be selected independently. Because AES is determined that the block size must be 128 bits and key length should be 128, 192, and 256 bits, then known as AES-128, AES-192, AES-256. A de-facto, there are only two variants of AES, namely AES-128 and AES-256, because the user will very rarely use 192-bit key length. Since AES has a key length of at least 128 bits, the AES resistant to exhaustive key search attack with current technology. With 128-bit key length, then there are 2, x 1038 possible keys. If used a machine with one billion processors in parallel, each one can calculate a lock every one Pico second, it would take 1,010 years to try all possible keys also Rijndael operates in the orientation of bytes to allow for an efficient implementation of the algorithm into software and hardware. ISSN: (Print) 5
6 6. ANDROID Android [11][12] is an operating system developed by Google, which promises openness, affordability, open source, and quality framework, to meet the needs of the operating system that supports standard and publishing APIs and can be utilized as a whole with low cost. Until now, Android has released several versions of Android to refine the previous version. Besides according numbering, on every version of Android there is a code name based on the names of the dessert. Android 1.5 released on 30 April 2009 was named Cupcake, Android 1.6 was released on 15 September 2009 was named Donut, and for the tablet version of Android 3.2 was released in May 2011 was named Honeycomb while for mobile Android phone last version was released on September 2, 2011 with the name of Gingerbread with tech support for Near Field Communication (NFC). Android's built-in on the Linux kernel (open Linux kernel), with a virtual machine that has been designed and to optimize use of memory and hardware resources on the mobile device environment of the Dalvik virtual machine. DalvikVM has the advantage of using the base processor registers because the device has been optimized for mobile phone-based execution registers. The application has a life cycle (cycle) is initiated when the Android initialize the component to respond to the intent to complete when the instance is destroyed. Figure 4 shows the process life cycle of an Android application. 7. TAG-TO-TAG PROTOCOL Figure 4. Android s lifecycle For security during the payment [14] process takes place between the merchant and the user is required optimum safety. In this study used the AES algorithm with 128-bit key length is the author of the quite reliable, especially on mobile devices with limited computing resources. As for the design of security protocols of 6 ISSN: (Print)
7 communication between the merchant and the user during the process of payment transactions take place depicted in Figure 5, which uses protocol Tag-to-Tag [13] with the following caption. MERCHANT (M) USER (U) a m M1 a u U1 b m M2 b u U2 c m c u Figure 5. Tag-to-Tag Protocol 1. Starting from the process a m and a u, merchant and user generate a session key shared (shared session key) that K SM and K SU are used in the process of encryption and decryption takes place during the payment process. 2. Merchant sends a message to the user that contains the ID number, transaction number, the payment amount, encrypted account number, authentication code, and the K SM key. 3. User sends a message to the merchant that contains the ID number, transaction number, balance, an encrypted account number and password, authentication code, and the K SU key. 4. In the process of b m, merchant check the amount of payment and the balance position of the user. If AMOUNT <ACCBALANCE then the PAY_M value is 1 (ACCEPT, the payment is received). And if AMOUNT> ACCBALANCE then the value of PAY_M is 0 (REJECT, the payment is rejected). 5. In the process b u, user checks the amount of payment and the balance position. If AMOUNT <ACCBALANCE then the PAY_M value is 1 (ACCEPT, the payment is received). And if AMOUNT> ACCBALANCE then the value of PAY_M is 0 (REJECT, the payment is rejected). Status of PAY_P validated by confirmation from the user by pressing the 'OK' or 'NO' on the screen. 6. Merchant sends a message to the user that contains the ID number, transaction number, payment amount, PAY_M, the encrypted account number, MAC M, and K SM. 7. Users send a message to the merchant that contains the ID number, transaction number, payment amount, PAY_P, account numbers and passwords are encrypted, MAC P, and K SP. 8. In the process of c m, the merchant verifies the value of PAY_P. If PAY_P = 'ACCEPT' & PAY_M = 'ACCEPT' the payer payment of funds deposited on the merchant's account, transactions are recorded and printed receipts. In the c u process, the user verifies the value of PAY_M. If PAY_P = ISSN: (Print) 7
8 'ACCEPT' & PAY_M = 'ACCEPT' balance payer then the position will be reduced and the status of the application recorded payment. 8. SYSTEM DESIGN Basically the system consists of two applications, namely on the merchant's payment application and pay application on the user. Application on the user or called nbelanja can do some things that 1. nbelanja provide the login page to activate the security features for transactions took place with the merchant, 2. nbelanja receives payment data from nbayar from the merchant, 3. nbelanja provides features to better secure PIN transactions taking place between the user and the merchant, 4. see the balance on the user by setting the value of the maximum balance of Rp.1,000,000 (one Million Rupiahs) to the level of micro-payments, 5. transaction record, with this facility the user can do and see footage of payment transactions that have been made between the user and merchant. Applications on the merchant or called nbayar there are several functions that can be done by merchant 1. payment, serves to provide payment data information that must be paid by the user, in this process occurs the connection / relationship between p2p users with a merchant to exchange information and confirmation with an encrypted channel, 2. records of transactions, recording transactions serve to see who has done between the merchant and the user which includes transaction time (day, date and hour), number of transactions and the amount paid by the user. Users do pay process by juxtaposing their device into the merchant device. Then the user receives payment data that must be paid according to results of previous shopping process from the merchant via the communication peer-to-peer based NFC. After the user approve the payment and enter your PIN, if true then the application will check the balance on the user's position and if sufficient then it will be forwarded to the process of sending data to the merchant's payment confirmation via peer-to-peer NFC-based payment transactions and make the records While in the merchant communicates with the user to transmit payment data information that must be paid users using peer-to-peer NFC-based channel that is encrypted in accordance with the security protocol in Section VII. Furthermore, the merchant awaiting confirmation of payment from the user through the same channel and after receiving confirmation, the application will record the transaction records in the database. nbelanja special applications on the user added features of electronic money (emoney, virtual money) that will be created in the encrypted form of a special file that can only be accessed by the main database with encryption and decryption process-based AES 128 bits. Restrictions on the implementation process of designing and manufacturing in this research utilizing pure NFC technology available on the Samsung Nexus S. 8 ISSN: (Print)
9 9. RESULTS AND DISCUSSION In this test performed simulations of merchant payment processing to the user. The process of implementation and testing of applications on hardware made directly to the Google Samsung Nexus S in pairs. While testing performed, the running time of each activity on the application process can be seen using DDMS and log process data delivery process from the user to the merchant. Table 1 Results of functional testing and processing time in the user Testing Activity Result Success Time (ms) NFCBelanjaActivity 389 TopupActivity 431 RekamActivity 356 HistoryActivity 355 P2PActivity 2,531 SaldoActivity 257 KonfirmasiActivity 405 From the test results as shown in Table 1 and 2 can be seen that in every activity does not require a long processing time less than 1 second except for P2PActivity. To process P2PActivity need longer time because it takes longer to process communication between 2 devices as well as encryption and decryption process, but not so influential because the time is only about 2,531 ms or equal to 2.5 s. Table 2 Results of functional testing and processing time at the merchant Testing Activity Result Success Time (ms) NFCMerchantActivity 354 HistoryActivity 282 P2PActivity 2,523 KonfirmasiActivity 544 RekamActivity 343 In addition to functional testing and processing time on the activity carried out safety testing also performed by comparing the time required to perform encryption and decryption for processing load 1,000 times. Figure 6 and 7 show the results of safety testing for encryption and decryption respectively. ISSN: (Print) 9
10 Time (ms) Time (ms) Computer Engineering and Applications Vol. 1, No. 1, June 2012 AES-128 Encryption on Android 2.3 crespo vision Data Length (bytes) Figure 6. Comparison of the AES 128 bit encryption AES-128 Decryption on Android 2.3 crespo vision Data Length (bytes) Figure 7. Comparison of 128-bit AES decryption time Analysis of test results from both applications and hardware used to is already running well. Hardware test results are very good with the use of the handset that is designed specifically with NFC technology. Overall nbelanja applications for users and nbayar for merchants with design is not real but still in the form of simulation has been able to show workflow processes as in real conditions. But nevertheless still many shortcomings and the need for more in-depth study covers the following issues 1. The security level of the interaction between applications and security in accessing the electronic money (e-money), 2. The process going forward must be made client - server to better be able to control the system from the merchants and third-party security including authentication and centralized management and database management better, 10. CONCLUSSIONS AND FUTURE WORKS Several conclusions can be drawn from this study are as follows. 1. Applications nbelanja and nbayar created as a model process payment with NFC technology that allows users to make the process pay by using mobile devices. Applications created with ease of understanding and designing made simple and adapted to process pay a more effective and user friendly making it easier for users to make the payment process. Application created a prototype 10 ISSN: (Print)
11 that shaped the future still remains much to do development and improvement of existing models. 2. The database used is a SQLite database which is owned by the Android platform so that the process will be faster and less computing resources in the process of reading the database. 3. Application processing time is done not too long and still in the process tolerance limits, not more than 1 second while for communication and information exchange process P2P NFC about 2.5 seconds. Future works of this study are: 1. Because this research is still a prototype or model of the actual process so that there are limitations to its use in real, then it is advisable in the future to be able to collaborate on NFC technology with the model client - server so that the process would be better. Combining the use SQLite databases and database servers like MySQL, Posgresql, or Oracle on the part of merchants enables the development process for the better, so that the merchants themselves can make the process better database management and more controlled. 2. Security process is still limited in the process of exchanging data / information from the user to the merchant through the device and need to be improved so that more secure from intrusion irresponsible for example by use of embedded device Secure Element as an important information storage medium 3. Further development is recommended to further involve a third party or third party such as Bank, Issuer or TSM (Trusted Service Management) so that the process of pay in this application is more real because of the process of authentication and verification process of such third party. REFERENCES [1].,, Over 400m Mobile Ticketing Users by 2013, 20 Juni 2011, WIB. [2]. Ade Hendraputra, Arif Budiono, Bayu Erfianto, Wardani Muhammad (2009). Aplikasi E-Commerce. Politeknik Telkom Bandung, Indonesia. [3]. S. Nambiar; C. T. Lu; and L. R. Lian (2004). Analysis of Payment Transaction Security in Mobile Commerce, in Proceedings of the IEEE International Conference on Information Reuse and Integration (IRI'04). Nevada, USA, pp [4].,(2011). Introduction to NFC, Forum Nokia June 22, 2011, GMT+7. [5].,(2011). Near Field Communication Technology and the Road a head, Forum NFC June 30, 2011, GMT+7. [6]. Dr. Thalal Alkharabi.(2007), Encryption Block Chiper, Lecture Notes, August 28, 2011, 08:24 GMT+7. [7]. Stalling W (2005). Cryptography and Network Security: Principles and Practice. Prentice Hall, Fourth Edition. ISSN: (Print) 11
12 [8]. Dandash Osama; Wu Xianping; Le Phu Dung (2005). Wireless Internet Payment System Using Smart Cards, Proceeding Of International conference on Information Technology : Coding and Computing. IEEE Xplore, /05 [9]. Rafael Martinez-Pelaez; Fransisco Rico-Novella; Christina Satizabal and Jhon J Padilla (2008). Performance Analysis of Mobile Payment Protocols over the Bluetooth Wireless Network, PerformanceAnalysisOfMobilePaymentProtocols.pdf, August 30, 2011, 08:21 GMT+7. [10]. Supakorn Kungpisdan (2005). Modelling, Design, and Analysis of Secure Mobile Payment Systems, August 12, 2011, 09:31 GMT+7. [11]. Reto Meier (2010). Professional Android 2 Application Development. Willey Publishing Inc, Indianapolis. [12]. Dominik Gruntz (2011). NFC with Android. University of Applied Sciences Northwestern Switzerland, Brugg-Windisch, Sept 16, 2011, GMT+7. [13]. Husni, E.; Kuspriyanto; Basjaruddin, N.; Purboyo, T.; Purwantoro, S.; and Ubaya, H. (2011). Efficient Tag to Tag NFC Protocol for Secure Mobile Payment, in Proceeding Of International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME). Bandung, Indonesia, pp [14]. HaselSteiner Ernst; Breitfub Klemens ( ). Security in Near Field Communication, SecurityinNFC.pdf, August 10, 2011, 11:15 GMT+7. [15]., ( ), Moserware, Jeff Moser s Software Development Adventure, [16]. Husni, E., Kuspriyanto, Basjaruddin, N., Purboyo, T., Purwantoro, S., and Ubaya, H., (2011), Efficient Tag to Tag NFC Protocol for Secure Mobile Payment, in Proceeding Of International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME), Bandung, Indonesia, pp ISSN: (Print)
The e-payment Systems
The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic
Electronic Commerce and E-wallet
International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: [email protected]
Ingenious Systems. Evolute System's. Mobile Payment. Initiative
Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial
Mobile Near-Field Communications (NFC) Payments
Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments
Inside the Mobile Wallet: What It Means for Merchants and Card Issuers
Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Welcome to the age of Universal Commerce commerce that is integrated, personalized, secure, open, and smart. The lines between in-store
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Chapter 5. Online Payment System. Types of Payment Systems. Cash Checking Transfer Credit Card Stored Value Accumulating Balance
Chapter 5 Online Payment System Copyright 2007 Pearson Education, Inc. Slide 5-64 Types of Payment Systems Cash Checking Transfer Credit Card Stored Value Accumulating Balance Copyright 2007 Pearson Education,
NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for
E-commerce refers to paperless exchange of business information using following ways.
E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods
RoverPal - A Mobile Payment Application
White Paper RoverPal - A Mobile Payment Application Introduction Online shopping has been a favorable experience with most of us. Still, we come across instances where we are out on shopping and we run
Framework of e-commerce
Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed
Credit card: permits consumers to purchase items while deferring payment
General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily
THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
Chapter 10. e-payments
Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss
Loyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
Your Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
Mobile Wallet Platform. Next generation mobile wallet solution
Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator
Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.
Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Store Logistics and Payment with Near Field Communication
with www.stolpan.com Store Logistics and Payment with Near Field Communication Hagenberg, Hagenberg, March March 20. 2007 20. 2007. Dr. László Kutor, Dr. BMF László Kutor, BMF 19/1 StoLPaN Project Summary
DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION
DECENTRALIZED SOCIAL NETWORK SERVICE USING THE WEB HOSTING SERVER FOR PRIVACY PRESERVATION Yoonho Nam, Changhoon Lee, Youngman Jung, Woongryul Jeon and Dongho Won Information Security Group, Sungkyunkwan
m Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Your gateway to card acceptance.
MERCHANT SERVICES Authorize.Net Solutions Your gateway to card acceptance. Processing transactions reliably and securely is essential to your business. That s why BBVA Compass and Authorize.Net, a leading
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
CHAPTER 6. Learning Objectives. Learning Objectives. E-commerce Payment Systems. Types of Payment Systems
CHAPTER 6 E-commerce Payment Created by, David Zolzer, Northwestern State University Louisiana Copyright 2002 Pearson Education, Inc. Slide 6-1 Copyright 2002 Pearson Education, Inc. Slide 6-2 Learning
Significance of Tokenization in Promoting Cloud Based Secure Elements
Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,
BGS MOBILE PLATFORM HCE AND CLOUD BASED PAYMENTS
HCE AND CLOUD BASED PAYMENTS 1 Contactless payments are vital for further development of the payment industry. More than 3 mln POS terminals around the globe can accept contactless payments. Mobile phones
Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH
EXPERIMENTAL ANALYSIS OF PASSIVE BANDWIDTH ESTIMATION TOOL FOR MULTIPLE HOP WIRELESS NETWORKS NURUL AMIRAH BINTI ABDULLAH THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE FACULTY OF COMPUTER
Payment Systems for E-Commerce. Shengyu Jin 4/27/2005
Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.
FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION
FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION MAKE THE SWITCH TO MONEXgroup ecommerce I Mobile I Wireless I Integrated I Countertop Solutions PAYMENTS IN-STORE PAYMENTS ON-THE-GO PAYMENTS ONLINE Accept
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
IMPLEMENTATION OF VOICE RECOGNITION TECHNOLOGY ON ENGLISH LEARNING APPLICATION BY SELF LEARNING BASED ON ANDROID DEVICE
F.2 IMPLEMENTATION OF VOICE RECOGNITION TECHNOLOGY ON ENGLISH LEARNING APPLICATION BY SELF LEARNING BASED ON ANDROID DEVICE Derwin Suhartono *, Calvin, Mery Yustina, Shandy Kurniawati, Haryono Soeparno,
CyberSource and NetSuite Getting Started Guide
CyberSource and NetSuite Getting Started Guide Abstract A comprehensive guide to setting up CyberSource and NetSuite to accept payments Table of Contents This document explains the different steps to set
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
Contents. 2 Welcome. 20 Settings. 3 Activation Steps. 4 Introduction. 4 Purpose. 20 Offline Mode Change Password. 5 Key Features
User s Guide Contents 2 Welcome 3 Activation Steps 4 Introduction 4 Purpose 5 Key Features 6 Activation 8 Using the System 8 Login 9 Credit Sale 10 For Swipe Capable Devices 10 For Manual Entry 12 Cash
How to connect your D210 using Bluetooth. How to connect your D210 using GPRS (SIM Card)
D210 En User Guide Content 3 Introduction 3 Scope 3 Related Documentation 4 Internet Connectivity 4 Using D210 with Mobile Phone 5 Using D210 with wireless (Wi-Fi) router 6 Using D210 with GPRS (requires
Your Digital Dollars Online & Mobile Banking
Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
The Goods, the Payment and the Mobile!
WHITEPAPER The Goods, the Payment and the Mobile! This whitepaper is an extract from: Mobile Payments for Digital & Physical Goods Analysis, Markets & Vendor Strategies 2011-2015... information you can
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
The Comprehensive, Yet Concise Guide to Credit Card Processing
The Comprehensive, Yet Concise Guide to Credit Card Processing Written by David Rodwell CreditCardProcessing.net Terms of Use This ebook was created to provide educational information regarding payment
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center
Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the
rf Technology to automate your BUsiness
Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,
Near Field Communication in Cell Phones
Near Field Communication in Cell Phones Annika Paus 24.07.2007 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Contents 1 Introduction 1 2 Standards
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
Blaze Vault Online Backup. Whitepaper Data Security
Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup
bi on Solution white paper
bi on Solution white paper Billon Solution Overview Despite concerted efforts for years, cash has not yet been eliminated. Mostly because not everyone has a bank account and debit card - an estimated 2.5
Paytooth - A Cashless Mobile Payment System based on Bluetooth
Paytooth - A Cashless Mobile Payment System based on Bluetooth Rushabh Patel 1, Akhil Kunche 1, Nihar Mishra 1, Zakwan Bhaiyat 1, Prof. Rahul Joshi 2 1,2 Symbiosis Institute of Technology (SIT) Affiliated
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
DATA TRANSMISSION USING AES ENCRYPTION VIA EMAIL AND SMS ARIF HANAFI BIN SHARIF KATULLAH
DATA TRANSMISSION USING AES ENCRYPTION VIA EMAIL AND SMS ARIF HANAFI BIN SHARIF KATULLAH A thesis submitted in fulfillment of the requirements for the award of the degree of the Bachelor of Computer Science
NFC Based Equipment Management Inventory System
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang
Frequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA
HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA A thesis submitted in fulfillment of the requirement for the awards of Bachelor of Computer Science (Computer Systems & Networking) with Honours Faculty of
BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE
BISKUT RAYA INVENTORY MANAGEMENT SYSTEM (BRIMS) NURUL AMIRAH BINTI ROSLAN THESIS SUBMITTED IN FULFILLMENT OF THE DEGREE OF COMPUTER SCIENCE FACULTY OF COMPUTER SYSTEM & SOFTWARE ENGINEERING UNIVERSITI
MOBILE PAYMENT SECURITY: BLE OR NFC
NEW SCIENCE TRANSACTION SECURITY ARTICLE MOBILE PAYMENT SECURITY: BLE OR NFC SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction security
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
NEWSLETTER PAX TECHNOLOGY. www.pax.com.cn. March 2014. Your Payment Partner of Choice
Your Payment Partner of Choice www.pax.com.cn March 2014 Your Payment Partner of Choice www.pax.com.cn March 2014 S-Series Products S800 Countertop Payment Terminal S900 Mobile Payment Terminal S300 Integrated
01. Introduction of Android
01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment
JOB AGENT MANAGEMENT SYSTEM LU CHUN LING. A thesis submitted in partial fulfillment of. the requirements for the award of the degree of
JOB AGENT MANAGEMENT SYSTEM LU CHUN LING A thesis submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Sciences (Software Engineering) FACULTY OF COMPUTER
Android pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com
The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses Making the customer payment process convenient,
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
Grow with our omni-channel payment processing technologies and merchant services.
Grow with our omni-channel payment processing technologies and merchant services. Get ready for growth Payment processing solutions ecommerce mcommerce In-app payments Virtual terminal Card present EMV
INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN
i INTEGRATING CONSUMER TRUST IN BUILDING AN E-COMMERCE WEBSITE NUR ZAILAN BIN OTHMAN A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Science
Mobile Cloud & Mobile Ticketing
Mobile Cloud & Mobile Ticketing T-109.4300 Network Services Business Models Lecture Antero Juntunen Researcher [email protected] Contents Mobile Cloud Introduction Drivers Restraints Conclusions Mobile
INTRODUCTION AND HISTORY
INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 6-1 E-commerce business. technology. society. Third Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 6-2 Chapter
PAYMENT SYSTEMS. E-Commerce Winter 2011 Marek Maurizio
PAYMENT SYSTEMS E-Commerce Winter 2011 Marek Maurizio THE PAYMENT REVOLUTION In 2011 we are still in the middle of a payment system revolution Electronic payments are taking the place of cash and checks
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Merchant Payment Solutions
Merchant Payment Solutions Credit Card Processing Diagram CUSTOMER S CREDIT CARD ISSUING BANK CUSTOMER 4 5 $ MERCHANT S BUSINESS MERCHANT S BANK ACCOUNT MERCHANT S BANK 9 CREDIT CARD NETWORK 8 INTERNET
How to connect your D200 using Bluetooth. How to connect your D200 using GPRS (SIM Card)
D200 En User Guide Content 3 Introduction 3 Scope 3 Related Documentation 4 Internet Connectivity 4 Using D200 with Mobile Phone 5 Using D200 with wireless (Wi-Fi) router 6 Using D200 with GPRS (requires
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Euronet s Contactless Solution
Serving millions of people worldwide with electronic payment convenience. Euronet s Contactless Solution Fast, Secure and Convenient Transactions with No Swiping, PIN or Signature Copyright 2011 Euronet
We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating
Given recent payment data breaches, clients are increasingly demanding robust security and fraud solutions; and Financial institutions continue to outsource and leverage technology providers given their
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
Threat Modeling for offline NFC Payments
Threat Modeling for offline NFC Payments 1 Fan Jia, 2 Yong Liu, 3 Li Zhang *1,Corresponding Author,2 Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China,
Industrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
American Express Contactless Payments
PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
the better way to pay
the better way to pay we are DOKU PT Nusa Satu Inti Artha (dba DOKU ) is Indonesia s largest and fastest growing provider of electronic payment. We provide electronic payment processing, online and in
Active RFID Technology for Asset Tracking and Management System
TELKOMNIKA, Vol.11, No.1, March 2013, pp. 137~146 ISSN: 1693-6930 accredited by DGHE (DIKTI), Decree No: 51/Dikti/Kep/2010 137 Active RFID Technology for Asset Tracking and Management System Evizal, Tharek
Merchant Payment Solutions
Merchant Payment Solutions What We Do Connecting your Web site to the payment processing networks is typically beyond the technical resources of most merchants. Instead, you can easily connect to the Authorize.Net
